Compliance starts when you build the list. Use verified fields, clear opt-out language, and documented criteria to protect deliverability and reduce risk.
Compliance In Three Steps
- Filter to verified fields before outreach.
- Send with clear opt-out language.
- Document list sources and criteria.
Compliance Workflow
Core CAN-SPAM-Aligned Practices
- Identify your sender clearly in every message.
- Provide a working opt-out method and honor requests promptly.
- Keep subject lines and messaging accurate and non-misleading.
- Maintain a clear record of list sources and criteria.
Use Verification Flags To Reduce Risk
Paid datasets include verified emails and verified phone numbers only when present (100% verified at publication). Optional discovered fields are labeled and included for free, so teams can evaluate them separately.
Treat discovered fields as a separate review list before outreach.
Sample Compliance Note
Example footer line: You are receiving this message based on public-facing contact information. Reply to opt out and we will remove you from future outreach.
Pre-Campaign Checklist
- Filter to verified email and phone fields.
- Remove duplicates and confirm formatting for CRM import.
- Prepare opt-out language and a compliance note.
- Record the dataset name, publish date, and filters used.
During Campaign
- Use consistent sender names and reply-to addresses.
- Track opt-outs in a suppression list.
- Log bounces and invalid addresses for future updates.
Responsible Use and Governance
Access Control
Limit access to approved team members and track usage.
Audit Readiness
Store verification flags alongside contact fields for compliance reviews.
Compliance Log Template
| Item | What to capture |
|---|---|
| Dataset name | State dataset and publish date |
| Filters used | Verified-only or confidence score threshold |
| Opt-out handling | Suppression list location and update cadence |
| Outreach date | Campaign name and send date |
